CATEGORIES

cybersecurity

Cyber threats , risk or vulnerability? What are the differences?

Cyber threats are real—and more common than you think. The word “threat” is often confused with (or used interchangeably with) the words “risk” and “vulnerability.” But in cybersecurity, it’s important to differentiate between threat, vulnerability, and risk....

New Challenges faced by Chief Information Officer today

Nowadays, Chief Information Officer  are focusing on business outcomes, agility, and improving customer experience through technology. While at the same, streamlining backend operations with automation is becoming one of the primary focus areas of technology leaders....

Cybersecurity at Healthcare companies

Digital technologies make it easier and more efficient to deliver patient care and provide better outcomes. However, the rise of digital technologies and the growing interconnectedness between different healthcare systems come with increasing healthcare cybersecurity...

Social Media Data Leaks: an increasingly data theft

Personal data leaks have occurred to both large and small businesses. In addition, it happens very frequently, more and more in recent years. Most of them are a consequence of cyber-attacks on networks or e-commerce security breaches. Incidents such as these can...
Cybersecurity Law Code

Cybersecurity Law Code

Cybersecurity Law Code There is a European Directive, Directive 2016/1148, regarding the measures aimed at guaranteeing a high common level of security in the networks and information systems of the...

read more
Ransomware: To pay or not to pay

Ransomware: To pay or not to pay

Ransomware: To pay or not to pay The main goal of hackers when carrying out a ransomware attack is to demand a ransom in return and profit. The 64% of Spanish companies agreed to pay the ransom...

read more
Why Zero Trust?

Why Zero Trust?

Zero Trust This concept was coined in 2010 by John Kindervag, a former Forrester Research analyst who is also considered one of the world's leading cybersecurity experts. Guided by the principle...

read more
Cybersecurity at Healthcare companies

Cybersecurity at Healthcare companies

Digital technologies make it easier and more efficient to deliver patient care and provide better outcomes. However, the rise of digital technologies and the growing interconnectedness between different healthcare systems come with increasing healthcare cybersecurity...